Vocabulary
Cyber Attacks
Tools
Malware
Hackers
100

The state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.

Cybersecurity

100

Emails that are fake and want you to click on a link to give you malware

Phishing

100

What can you use to find computers connected to the internet

shodan

100

Causes pop-up and pop-under advertisements on user's system.  Often installs with bundles of freeware programs or when visiting a web site with it running in the background.

Adware

100

People may perform network penetration tests in attempt to compromise networks and systems by using their knowledge of computer security systems to discover network vulnerabilities

white hat hackers

200

A point at which there is potential for a security breach

Vulnerability

200

Some danger that can exploit a vulnerability

Threat

200

This is a method of access control by which users must present multiple, separate pieces of identification, such as a password and keycard, in order to access a system

multi-factor authentication

200

records the activities of the user, such as the passwords they type into the computer and transmits this information to the person who wrote the malware

spyware

200

Hackers primary motivation is to find weaknesses in a companies security to then either get paid by the company or to expose the weakness to other hackers

Gray hat hacker

300

This attack aims to make a service such as a website unusable by “flooding” it with malicious traffic or data from multiple sources (often botnets)

Denial of Service (DDoS)

300

A certain type of social engineering technique that manipulates victims into revealing information.

Pretexting

300

This service allows users to remain anonymous, masking their identity/location and encrypts traffic.

VPN

300

The practice of redirecting the users to a fake website that mimics the appearance of a legitimate one, with the goal of stealing personal information such as passwords, account numbers, and other personal information.

Pharming

300

This hacker's primary motivation is financial/personal gain

Black hat hacker

400

Someone who hacks for a protest against the government

Hacktivist

400

An independent malware program that self-replicates in order to spread from machine to machine to cause damage.

worm

400

Computer software used to prevent, detect and remove malicious software

antivirus

400

malware that demands payment in order to refrain from doing some harmful action or to undo the effects of the harmful action

ransomware

400

Willing to perform an attack for a “cause” even if it means they get caught

Suicide Hackers